Date: Mon, 03 May 1999 19:32:11 -0400 (EDT) From: Seth <seth@freebie.dp.ny.frb.org> To: freebsd-stable@freebsd.org, security@freebsd.org Subject: FreeBSD 3.1 remote reboot exploit (fwd) Message-ID: <Pine.BSF.4.10.9905031931170.54151-100000@freebie.dp.ny.frb.org>
index | next in thread | raw e-mail
Just hit bugtraq, figured people might want to get in touch or start
digging.
SB
---------- Forwarded message ----------
Date: Sat, 01 May 1999 03:18:40 -0500
From: Jamie Rishaw <jamie@EXODUS.NET>
To: BUGTRAQ@netspace.org
Subject: FreeBSD 3.1 remote reboot exploit
Hi,
Sorry to be so vague, but I wanted to let everyone know,
It's been demonstrated to me by two people who will not reveal "how"
that there is a remote bug exploit, almost certainly over IP, that will
cause FreeBSD-3.1 systems to reboot with no warnings.
The second box this was demonstrated on today had no open services
besides ircd, and was remote rebooted. (The first box had open services
such as smtp, ssh, pop, http, but did /not/ run ircd, eliminating ircd
as the culprit).
If anyone can shed some light on this (really bad) issue, it'd be
greatly appreciated, especially since I am(was) in the process of
upgrading all of my boxes to 3.1. (3.1-REL).
Regards,
-jamie
--
jamie rishaw (efnet:gavroche) -- Exodus Communications, Inc.
>Sr. Network Engr, Chicago, SoCal Data Centers
<jimmie> In an interesting move Exodus Communications annouced today that
they have replaced all of their backbone engineers with furby's
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
home |
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9905031931170.54151-100000>
